Algorithm and implementation of the network data filter with concealed from the outside observer rules
Download article in PDF format
Authors: Sergeev D. V., Hadi R. A.
Annotation: It is shown the application of network information filtering algorithm taking into account the presence of one or more outside observers interested in the showdown of the algorithm. It is constructed a model of threats and an example implementation.
Keywords: filtration, outside observer, network information, the hidden record